background image

Expanding Your EFW Configuration

13

f

In the Administrator tab, select the 

All administrator components

 check 

box in the For area, and the 

All administrator events 

check box in the 

Show area.

g

Click 

OK.

h

In the Audit Browser window in the List of Queries, click on the 

All 

Recent Audit Records

 

query you just created. In the Query menu, select 

Execute

 (or click the 

 icon). 

Double-click on any event in the table to see detailed information for 
that event.

The audit results should appear in table format. For information on 
viewing audit results, refer to the section “Audit Information” in the 

3Com Embedded Firewall Administration Guide

.

Expanding Your EFW Configuration

Now that you have a basic EFW system configured and running, you can 
expand your configuration as needed to best suit your organization’s security 
needs. The following list provides some sectional references to the 

3Com 

Embedded Firewall Administration Guide

 

that will assist you in expanding 

your configuration.

To add additional EFW NICs to your system, refer to”

Distributing and 

Installing the EFW NIC Firmware

.”

To create additional policies, refer to “

Creating Policies and Rules.”

To add additional Policy Servers for redundancy, refer to “

Configuring 

Policy Servers for Redundancy.”

To install additional remote Management Consoles, refer to “

Installing and 

Uninstalling EFW Software

.”

For an overview of EFW and its basic components, concepts, and 
operations, refer to Chapter 1, “Planning and Overview.”

Summary of Contents for 3CR990

Page 1: ...3Com Embedded Firewall Software for the 3CR990 Network Interface Card NIC Family Quick Start Guide http www 3com com http www 3com com registration frontpg pl 09 2110 000 Published December 2001...

Page 2: ...ges in the product s and or the program s described in this documentation at any time If there is any software on removable media described in this documentation it is furnished under a license agreem...

Page 3: ...ecovery diskette 5 Importing the No sniffing no spoofing pre defined Policy and Assigning it to the Default Device Set 6 Installing and Registering an EFW NIC 7 Verifying NIC Registration 8 Changing t...

Page 4: ......

Page 5: ...information for expanding your EFW system to best suit your security needs What You Will Need Before you install the EFW software you will need A computer to host the Policy Server and Management Cons...

Page 6: ...w provide instructions for installing a Policy Server and Management Console on a single system using the Typical installation method 1 Insert the 3Com product CD in the appropriate drive the Installa...

Page 7: ...s offered on this screen 2 Select Confirm Create New Domain 3 Enter a domain name in the Domain Name field The domain name is used only as a reference to assist you in identifying a particular domain...

Page 8: ...w system are as follows Login admin Password admin 3 Select the Policy Server that you just created from the Policy Server list 4 Click Connect The Embedded Firewall Management Console window appears...

Page 9: ...upon creation of a new EFW domain After installing your first policy server in an EFW domain it is critical to make a copy of the files named public key and server keystore from your installation Sav...

Page 10: ...fing pre defined policy follow the steps below 1 From the Main menu select Import Policy Rule set The Import Policy Rule Set window appears 2 Select Policy and click Next 3 Click Browse and navigate t...

Page 11: ...ry on the computer that will receive the EFW NIC installation on a computer on which a 3Com 3CR990 NIC is installed NOTE You may assign any policy to the default device set The No sniffing no spoofing...

Page 12: ...w frame The NIC should be listed in the default device set 4 If desired remove the temporary directory created for the NIC installation package For information on other installation methods refer to t...

Page 13: ...indows 2000 Standard rule set you can create a sample policy by following the steps in the section below Creating a Policy In this section you will create a sample policy called the No IP Initiation p...

Page 14: ...include information about what the policy does or when to use it for example the bulleted information provided at the beginning of this section 6 The access control list ACL initially contains only t...

Page 15: ...evious section A device set is a collection of EFW devices that are associated with a specific policy You can define any number of device sets and assign EFW devices to any one of those device sets To...

Page 16: ...ion policy To ensure that the policy is functioning as expected the following steps attempt to connect to the Internet by initiating the TCP protocol HTTP which should be denied by the policy being en...

Page 17: ...de Expanding Your EFW Configuration Now that you have a basic EFW system configured and running you can expand your configuration as needed to best suit your organization s security needs The followin...

Page 18: ......

Reviews: